RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재후보

        Strengthening Hyperconnectivity with Imperative Digital Lifestyle

        후세인,김종호 한국비즈니스학회 2022 비즈니스융복합연구 Vol.7 No.1

        In this article, we tried to show that hyperconnectivity is not only related to the technology that enables interaction and communication but also to the impact this technology has on personal digital lifestyle and social community behaviour. Indeed, hyperconnectivity results from a combination of wider availability of high broadband expansion, exponential growth in the spread of mobile and laptops and high speed wireless networks. It includes the dominance of social media and consumer generated media in daily life and the recent use of the cloud for data and application access. Furthermore, hyperconnected communication includes not only human to human setups (i.e. as individuals and as members of groups and uses a significant amount of digital media) but also communication among individuals and machines and amongst machines to machines without the direct involvement of human beings. In this article, we have tinted this idea that hyperconnectivity is leveraging with today`s imperative digital lifestyle and digital media. Also, we advise that hyperconnectivity may become a central issue for the future if proper preparation does not espouse.

      • KCI등재

        Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks

        후세인라쉬드,오희국 한국정보보호학회 2014 정보보호학회논문지 Vol.24 No.6

        Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET)which is on its way towards the deployment stage, thanks to the advancements in the automobile and communicationtechnologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due tosecurity and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peervehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to theroads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has beenfound out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if differentpseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In thispaper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchangetheir pseudonyms with neighbors and then use neighbors’ pseudonyms in their own messages. To this end, our proposed schemeconditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.

      • KCI등재

        A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds

        후세인라쉬드,오희국 한국정보보호학회 2014 정보보호학회논문지 Vol.24 No.5

        Vehicular Ad hoc Network (VANET) has gone through a rich amount of research and currently is making its way towardsthe deployment. However, surprisingly it evolved to rather more applications and services-rich breed referred to as VANET-basedclouds due to the advancements in the automobile and communication technologies. Security and privacy have always been thechallenges for the think tanks to deploy this technology on mass scale. It is even worse that some security issues areorthogonally related to each other such as privacy, revocation and route tracing. In this paper, we aim at a specificVANET-based clouds framework proposed by Hussain et al. namely VANET using Clouds (VuC) where VANET and cloud infrastructure cooperate with each other in order to provide VANET users (more precisely subscribers) with services. We specifically target the aforementioned conflicted privacy, route tracing, and revocation problem in VANET-based clouds environment. We propose a multiple pseudonymous approach for privacy reasons and leverage the beacons stored in the cloud infrastructure for both route tracing and revocation. In the proposed scheme, revocation authorities after colluding, can trace the path taken by the target node for a specified timespan and can also revoke the identity if needed. Our proposed scheme is secure, conditional privacy preserved, and is computationally less expensive than the previously proposed schemes.

      • 고객 정보의 개인 정보 보호를 고려한 멀티 마이크로그리드 시스템의 최적 운영

        후세인아크타르 ( Akhtar Hussain ),부이반하이 ( Van-hai Bui ),김학만 ( Hak-man Kim ) 한국정보처리학회 2016 한국정보처리학회 학술대회논문집 Vol.23 No.1

        Information security and preservation of customer’s data privacy are key factors for further wide spread adoption of microgrid (MG) technology. However, strong coupling between the operation cost of multi-microgrid (MMG) system and privacy of customer data makes it more challenging. A nested energy management system (EMS) has been proposed in this paper. The surplus/shortage information from the inner level MGs is included in processing the optimal operation of outer level MGs. This type of optimization ensures a layered privacy-preservation to customer at each MG level. The proposed EMS architecture is a better trade-off architecture between the operation cost of the MMG system and customer privacy-preservation at each level of MG.

      • 05 포스터 발표 : PN-06 ; 근권세균에 의한 배추 염내성 효과

        후세인카알이드 ( Khalid A. Hussein ),주진호 ( Jin Ho Joo ) 한국환경농학회 2014 한국환경농학회 학술대회집 Vol.2014 No.-

        Salinity has been a threat to agriculture in some parts of the world; and recently, the threat has grown. Plant growth-promoting rhizobacteria (PGPR) may benefit plant growth, either by improving plant nutrition or producing plant growth hormones. The effects of rhizobacterial strains to reduce the salinity stress on the germination of Chinese cabbage seeds were tested using four concentrations of NaCl (50, 100, 150, and 200 mM). Also, PGPR strains were tested to enhance the early germination of Chinese cabbage seeds under normal conditions. Azotobacter chroococcum showed best with enhancing in the radicle length of 4, 1.2, and 1 at treatments of 50, 100, and 150 mM of NaCl, respectively. Additionally, significant differences were found in plumule length, A. chroococcum and Lactobacillus sp showed remarkable activation either in normal or under stress conditions. Co-inoculation by three rhizobacterial strains (LAPmix) indicated synergistic effect to enhance the early germination of the seeds. The results of this study are promising for application of rhizobacterial strains that possess plant growth promoting traits to enhance the plant tolerance against salinity.

      • Shape Optimization of Micro-channel Heat Sink for Micro-electronic Cooling

        Afzal Husain(후세인아프잘),Kwang-Yong Kim(김광용) 한국유체기계학회 2006 유체기계 연구개발 발표회 논문집 Vol.- No.-

        A numerical investigation of three dimensional fluid flow and heat transfer in a rectangular micro-channel has been carried out using water as a cooling fluid in a silicon substrate. Navier-Stokes and energy equations for laminar flow and conjugate heat transfer are solved using a finite volume solver. Solutions are first carefully validated with the experimental results available; the shape of the micro-channel is then optimized using surrogate methods. Ratios of width of the micro-channel to depth and width of the fin to depth are selected as design variables. Design points are selected through three level D-optimal designs. A single objective function thermal resistance, formulated using pumping power as constraint, is optimized. Response surface analysis, Kriging and Radial basis neural network methods are applied to construct surrogates and the optimum point is searched by sequential quadratic programming.

      • An Object Interaction Testing Approach based on Interaction Pattern in Object-Oriented System

        Hossain Muhammad Iqbal(후세인무하메드입팔),Woo Jin Lee(이우진) 한국정보과학회 2014 정보과학회논문지 : 소프트웨어 및 응용 Vol.41 No.1

        객체지향 개념은 효율적인 구조화 개념으로 인해 소프트웨어 설계에 널리 이용되고 있다. 일반적으로 객체는 메시지 전송 방식으로 다른 객체의 메소드를 호출한다. 여러 객체간의 상호작용은 이러한 호출 관계뿐만 아니라 묵시적인 데이터 흐름에 의한 상호작용 패턴이 존재한다. 이러한 객체간의 묵시적 상호작용은 객체간의 특정 의존성을 유발하며 이로 인해 객체간의 의존성 테스트를 어렵게 한다. 일반적인 객체지향 테스트에서는 각 클래스와 클래스간의 호출관계를 중점적으로 다루지만, 데이터 흐름에 기인하여 겉으로 드러나지 않는 묵시적 상호작용 패턴을 파악하고 검사하는 것이 더욱 필요하다. 이 연구에서는 이러한 상호작용 패턴을 데이터 흐름 분석 기법으로 분석하여 뽑아내고 이러한 상호작용 별로 데이터 흐름테스트 기법을 활용하여 테스트 시나리오를 생성하는 기법을 제안한다. Object-oriented paradigm has rapidly become the preferred model for system design by its structuring mechanism. Usually an object invokes some method of another object by sending messages to one another. Besides interaction based on calling relation, there exists several dataflow driven interaction patterns which may contain complex interactions between more than one object. These implicit object interactions cause specific dependency among the classes, which makes the testing procedure difficult. Traditional testing techniques are used widely to test each class and its direct calling relationship but it is necessary to identify and check implicit interaction patterns between instances of different classes. In this paper, we investigate different object interaction pattern and generate test sequences for each of the pattern using data flow approach.

      • 클라우드 컴퓨팅 환경에서 공개적 검증과 동적 연산이 가능한 효율적인 데이터 무결성 검증기법

        손정갑 ( Junggab Son ),후세인라쉬드 ( Rasheed Hussain ),오희국 ( Heekuck Oh ) 한국정보처리학회 2012 한국정보처리학회 학술대회논문집 Vol.19 No.2

        클라우드 컴퓨팅을 제공하기 위해 서비스 제공자는 대용량의 중앙집중형 데이터 센터를 구축하고, 클라이언트는 어플리케이션 소프트웨어와 데이터베이스를 이러한 데이터 센터에 저장한다. 클라우드 컴퓨팅을 사용하면 컴퓨팅 자원을 구축하는 비용을 절감할 수 있다는 장점이 있다. 문제는 클라이언트가 데이터 센터와 서비스제공자를 완전히 신뢰할 수 없다는 것이다. 예를 들어, 클라우드에 저장된 파일이 손실되었을 때 서비스 제공자는 서비스의 신뢰도가 떨어지는 것을 막기 위해 이를 숨길 수 있다. 이때, 데이터가 저장 후에 손실되었다는 것을 증명하지 못하면, 그 피해는 클라이언트에게 돌아오게 된다. 따라서, 클라이언트의 데이터를 보호하기 위하여 무결성을 검증할 수 있는 적절한 기법을 적용하여야 한다. 대부분의 기존 연구에서는 public aditability와 dynamic data update를 동시에 지원하지 못하며, 이를 동시에 지원한다 하더라도 효율성이 떨어지는 문제가 있다. 본 논문에서는 클라우드 컴퓨팅에서 데이터 스토리지의 무결성을 검증하기 위한 기법을 제안한다. 제안하는 기법은 효율성, 동적 데이터 환경, public auditability를 설계목표로 한다. 블록 마다 서명을 생성해야 하는 이전 기법과 달리, 제안하는 기법은 한번의 서명으로 검증값을 생성하므로 데이터의 크기에 영향을 적게 받는다. 또한, 삽입, 삭제, 수정 등의 연산이 발생하는 동적 데이터 환경에서도 효과적으로 저장된 데이터의 무결성을 검증할 수 있게 설계하였다. 마지막으로 파일에 접근할 수 있는 클라이언트는 누구나 데이터의 무결성을 확인할 수 있으므로 public auditability를 제공한다.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼